A Tutorial of Mobile Ad-Hoc Network (Manet) Routing Protocols
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: In mobile adhoc network nodes dynamically forms networks, there is no any central infrastructure, thus routing becomes a very important issue. Routing protocols used in mobile ad hoc networks (MANET) must adapt to frequent or continual changes of topology, while simultaneously limiting the impact of following these changes on wireless resources. This paper presents a comprehensive report and a comparative study of the different MANET routing protocols. The performance of such communication between nodes depends on various protocols. we have tendency to survey variety of the recent analysis results in routing space. In the following sections we have a tendency to present various existing routing protocols with their merits and demerits
Authors and Affiliations
Palki Dhawan
Dn Searching Technique
Abstract: Searching in computer science is the method which finds the required item in the given data. Linear Search is the technique for extracting a particular item in the list that checks each part in series until the...
Selfish Node Detection in Replica Allocation over MANETs
: MOBILE ad hoc networks (MANETs) have attracted a lot of attention due to the popularity of mobile devices and the advances in wireless communication technologies. A MANET is a peer-to-peer multi hop mobile wire...
A Survey on Enhancing Routing using NCPR in Mobile Ad hoc Networks
Abstract: Mobile Ad hoc Network (MANET) is collection of wireless mobile hosts (or nodes) that are free to move in any directions at any speed. This nature of MANET’s leads to periodic link breakage, which in turn...
Evaluation of Bitmap Index Compression using Data Pump in Oracle Database
Abstract: Bitmap index is most commonly used technique for efficient query processing and mostly in the Data warehouse environment. We review the existing technologies of Compression and introduce the bitmap index...
Prospective Utilization of Elliptic Curve Cryptography for Security: Authentication, Encryption and Decryption
Abstract : Public key cryptography is typically used in the field of mathematical, which consist of factors decomposition problem of huge numbers and discrete logarithm problem in finite field. For huge numbers in...